標(biāo)題: Titlebook: Database Systems for Advanced Applications; 16th International C Jeffrey Xu Yu,Myoung Ho Kim,Rainer Unland Conference proceedings 2011 Spri [打印本頁(yè)] 作者: 作業(yè) 時(shí)間: 2025-3-21 16:28
書(shū)目名稱Database Systems for Advanced Applications影響因子(影響力)
書(shū)目名稱Database Systems for Advanced Applications影響因子(影響力)學(xué)科排名
書(shū)目名稱Database Systems for Advanced Applications網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Database Systems for Advanced Applications網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Database Systems for Advanced Applications被引頻次
書(shū)目名稱Database Systems for Advanced Applications被引頻次學(xué)科排名
書(shū)目名稱Database Systems for Advanced Applications年度引用
書(shū)目名稱Database Systems for Advanced Applications年度引用學(xué)科排名
書(shū)目名稱Database Systems for Advanced Applications讀者反饋
書(shū)目名稱Database Systems for Advanced Applications讀者反饋學(xué)科排名
作者: 生存環(huán)境 時(shí)間: 2025-3-21 22:22 作者: 時(shí)代錯(cuò)誤 時(shí)間: 2025-3-22 00:55 作者: 高度贊揚(yáng) 時(shí)間: 2025-3-22 08:36
Spread a Little Happiness: West End Musicalsy works the systems and processes that enable physical goods to be developed, manufactured, bought and sold services to be delivered everything from people and money to oil, water and electrons to move and billions of people to work and live. All these become possible via information integration sca作者: myocardium 時(shí)間: 2025-3-22 09:20 作者: BOGUS 時(shí)間: 2025-3-22 14:14
https://doi.org/10.1007/978-1-349-25091-2abases provide a rule-based language called Datalog. (Datalog with negation) that uses function-free Horn clauses with negation to express deductive rules?[1], and is a simplified version of the logic programming language Prolog?[2]. A deductive database consists of an extensional database and an in作者: BOGUS 時(shí)間: 2025-3-22 17:04 作者: magenta 時(shí)間: 2025-3-22 22:12 作者: 共同確定為確 時(shí)間: 2025-3-23 04:41
Experimental Theatre in Scotland As folksonomies are gaining in popularity, the expert search and spammer detection in folksonomies attract more and more attention. However, most of previous work are limited on some folksonomy features. In this paper, we introduce a generic and flexible user expertise model for expert search and s作者: 改正 時(shí)間: 2025-3-23 08:26
Spread a Little Happiness: West End Musicalsm groups in blogspace. An important way to understand the development of blogspace is to identify topic experts as well as blog communities and to further find how they interact with each other. Topic experts are influential bloggers who usually publish “authoritative” opinions on a specific topic a作者: 提名 時(shí)間: 2025-3-23 10:03
The Electronic Media and British Dramal network may result in nontrivial utility loss. The reason is that the number of the edges modified when anonymizing the social network is the only metric to evaluate utility loss, not considering the fact that different edge modifications have different impact on the network structure. To tackle t作者: notion 時(shí)間: 2025-3-23 16:31 作者: Tempor 時(shí)間: 2025-3-23 19:52 作者: 1分開(kāi) 時(shí)間: 2025-3-23 22:44 作者: osteoclasts 時(shí)間: 2025-3-24 04:46 作者: Exclude 時(shí)間: 2025-3-24 08:33
Springer Series in Fashion Businesstterns without introducing opaque operators or loop-like statement. In this paper, we cope with this problem using relational algebra to formulate pattern mining queries. We introduce several operators based on the notion of cover allowing to express a wide range of queries like the mining of freque作者: 溝通 時(shí)間: 2025-3-24 11:35 作者: 領(lǐng)巾 時(shí)間: 2025-3-24 17:17 作者: 不在灌木叢中 時(shí)間: 2025-3-24 22:28 作者: 門(mén)窗的側(cè)柱 時(shí)間: 2025-3-24 23:52
https://doi.org/10.1007/978-3-319-00651-2ropose a novel complex spatio-temporal sequence (STS) mining in Flickr, which retrieves the optimal STS in terms of distance, weight, visiting time, opening hour, scene features, etc.. For example, when a traveler arrives at a city, the system endow every scene with a weight automatically according 作者: extinguish 時(shí)間: 2025-3-25 06:29
Kazunori Komatani,Shojiro Mori,Satoshi Satoand purchase transactions to find mobile sequential patterns. However, these patterns cannot reflect actual profits of items in transaction databases. In this work, we explore a new problem of mining high utility mobile sequential patterns by integrating mobile data mining with utility mining. To th作者: 秘傳 時(shí)間: 2025-3-25 09:11
Virus Transmission Genetic Algorithmallows delegation of administrative privileges for both roles and access rights between roles. We have introduced the notion of trust in delegation and have shown how extended logic programs can be used to express and reason about roles and their delegations with trust degrees, roles’ privileges and作者: 鼓掌 時(shí)間: 2025-3-25 12:58
Jeffrey Xu Yu,Myoung Ho Kim,Rainer UnlandFast-track conference proceedings.State-of-the-art research.Up-to-date results作者: freight 時(shí)間: 2025-3-25 19:48 作者: affinity 時(shí)間: 2025-3-25 23:40 作者: conscience 時(shí)間: 2025-3-26 03:21 作者: craving 時(shí)間: 2025-3-26 07:14
The Multiplicity of British Theatresider the location, they only consider the physical location of the user which cannot be used for capturing the user’s intention..We propose an effective method to calculate the user similarity using the semantics of the location. By using the semantics of the location, we can capture the user’s int作者: 建筑師 時(shí)間: 2025-3-26 11:46 作者: Inertia 時(shí)間: 2025-3-26 16:41
https://doi.org/10.1007/978-981-13-0517-7x to accelerate query and to help return the exactly required data tuples. Finally we analyze the security properties and demonstrate the efficiency and query response time of our approach through empirical data.作者: Fsh238 時(shí)間: 2025-3-26 17:44
Mohammad Anisseh,Mohammad Reza Shahrakiinds of activities. In order to extract semantic regions, we propose a sequential clustering approach to discover clusters as the semantic regions from individual trajectory according to the spatial-temporal density. Based on semantic region discovery, we develop a shared nearest neighbor (SNN) base作者: 不規(guī)則的跳動(dòng) 時(shí)間: 2025-3-27 00:19 作者: 變異 時(shí)間: 2025-3-27 01:38 作者: Jargon 時(shí)間: 2025-3-27 07:05
What Have We Learnt from Deductive Object-Oriented Database Research?ursive deductive rules and recursive queries. Moreover, deductive databases have a firm logical foundation that consists of both model-theoretic semantics in terms of the minimal model?[3], the stable model?[4], and the well-founded model?[5], and proof-theoretic semantics in terms of bottom-up fixp作者: 頌揚(yáng)國(guó)家 時(shí)間: 2025-3-27 13:18 作者: Delude 時(shí)間: 2025-3-27 13:53
Distributed Privacy Preserving Data Collectionencryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data collection. Meanwhile, the protocol is designed to leak limited but non-critical information to achieve practicability and efficiency. Experiments show that the utility of th作者: lobster 時(shí)間: 2025-3-27 19:54
Privacy Preserving Query Processing on Secret Share Based Data Storagex to accelerate query and to help return the exactly required data tuples. Finally we analyze the security properties and demonstrate the efficiency and query response time of our approach through empirical data.作者: 泰然自若 時(shí)間: 2025-3-28 00:29 作者: carotid-bruit 時(shí)間: 2025-3-28 02:18
STS: Complex Spatio-Temporal Sequence Mining in Flickrscene, and its difference for different users, as well as the travel time limitation. In this paper, we provide two approximate algorithms: a local optimization algorithm and a global optimization algorithm. Finally, we give an experimental evaluation of the proposed algorithms using real datasets i作者: esoteric 時(shí)間: 2025-3-28 08:37
Node Protection in Weighted Social Networksps prevent node re-identification in the weighted graph based on three distance functions which measure the nodes’ difference. We also design corresponding algorithms for each distance to achieve anonymity. Some experiments on real datasets show the effectiveness of our methods.作者: EPT 時(shí)間: 2025-3-28 13:24 作者: 有角 時(shí)間: 2025-3-28 18:12
Conference proceedings 2011ed and selected from a total of 225 submissions. The topics covered are social network, social network and privacy, data mining, probability and uncertainty, stream processing, graph, XML, XML and graph, similarity, searching and digital preservation, spatial queries, query processing, as well as indexing and high performance.作者: Audiometry 時(shí)間: 2025-3-28 22:05 作者: eustachian-tube 時(shí)間: 2025-3-29 01:29 作者: Vulnerable 時(shí)間: 2025-3-29 06:12
Spread a Little Happiness: West End Musicalspic experts. Based on the topic experts identified, we further propose a new approach to identify the related blog communities on that topic. Experiments are conducted and the results demonstrate that our approaches are very effective and efficient.作者: Colonnade 時(shí)間: 2025-3-29 07:32
The Electronic Media and British Dramaposed. It focuses on the changes on social network topological feature, but not purely the number of edge modifications. Second, an efficient algorithm is designed to anonymize a given social network with relatively low utility loss. Experimental evaluation shows that our approach effectively generates anonymized social network with high utility.作者: Engaged 時(shí)間: 2025-3-29 11:54
Chi Wai Wu,Kwok Fai Geoffrey Tsors, thus mitigating the issue of high false alarm rate. Extensive empirical studies on real datasets show that our approach efficiently and effectively detects outliers, even in high-dimensional spaces.作者: MONY 時(shí)間: 2025-3-29 17:53
Guoxiang Yuan,Zhuoming Chen,Domenico Luzzie an efficient algorithm, IncGen, for incremental generator mining. We have conducted thorough experiment evaluation and the experimental results show that the IncGen algorithm outperforms state-of-the-art generator-mining method FEAT significantly.作者: 欄桿 時(shí)間: 2025-3-29 22:03 作者: 變形 時(shí)間: 2025-3-30 00:29 作者: ASTER 時(shí)間: 2025-3-30 06:49
Database Scalability, Elasticity, and Autonomy in the Cloud cloud: designing scalable database management architectures using the concepts of . and ., enabling lightweight elasticity using low cost live database migration, and designing intelligent and autonomic controllers for system management without human intervention.作者: Substitution 時(shí)間: 2025-3-30 09:59 作者: GLOOM 時(shí)間: 2025-3-30 15:09
Identifying Topic Experts and Topic Communities in the Blogspacepic experts. Based on the topic experts identified, we further propose a new approach to identify the related blog communities on that topic. Experiments are conducted and the results demonstrate that our approaches are very effective and efficient.作者: 聽(tīng)覺(jué) 時(shí)間: 2025-3-30 18:17
Utility-Oriented K-Anonymization on Social Networksposed. It focuses on the changes on social network topological feature, but not purely the number of edge modifications. Second, an efficient algorithm is designed to anonymize a given social network with relatively low utility loss. Experimental evaluation shows that our approach effectively generates anonymized social network with high utility.作者: intangibility 時(shí)間: 2025-3-30 23:20 作者: 高原 時(shí)間: 2025-3-31 04:04 作者: conceal 時(shí)間: 2025-3-31 06:38 作者: coltish 時(shí)間: 2025-3-31 12:18 作者: Memorial 時(shí)間: 2025-3-31 17:17 作者: 緩和 時(shí)間: 2025-3-31 18:56 作者: fulmination 時(shí)間: 2025-3-31 22:06 作者: ASSET 時(shí)間: 2025-4-1 02:27 作者: RAGE 時(shí)間: 2025-4-1 08:25 作者: 提名 時(shí)間: 2025-4-1 12:28